default search action
Peixin Chen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j8]Yuwei Li, Gui-Hua Lin, Peixin Chen:
Settlement Selection Strategic Analysis for Self-Operated E-Commerce Platforms under Market Competition. Syst. 12(8): 293 (2024) - 2023
- [j7]Yangfeng Chen, Xingliang Zhang, Xi Peng, Yicheng Jin, Peiwen Ding, Jiedan Xiao, Changxiao Li, Fei Wang, Ashley Chang, Qizhen Yue, Mingyi Pu, Peixin Chen, Jiayi Shen, Mengrou Li, Tengfei Jia, Haoyu Wang, Li Huang, Guoji Guo, Wensheng Zhang, Hebin Liu, Xiangdong Wang, Dongsheng Chen:
SPEED: Single-cell Pan-species atlas in the light of Ecology and Evolution for Development and Diseases. Nucleic Acids Res. 51(D1): 1150-1159 (2023) - 2022
- [j6]Peixin Chen, Xuan Zhou, Jian Zhao, Furao Shen, Sumei Sun:
Energy-Efficient Resource Allocation for Secure D2D Communications Underlaying UAV-Enabled Networks. IEEE Trans. Veh. Technol. 71(7): 7519-7531 (2022) - 2016
- [j5]Zhihong Liu, Aimal Khan, Peixin Chen, Yaping Liu, Zhenghu Gong:
DynamicAdjust: Dynamic Resource Adjustment for Mitigating Skew in MapReduce. IEICE Trans. Inf. Syst. 99-D(6): 1686-1689 (2016) - [j4]Yilun Wu, Xinye Lin, Xicheng Lu, Jinshu Su, Peixin Chen:
A Secure Light-Weight Public Auditing Scheme in Cloud Computing with Potentially Malicious Third Party Auditor. IEICE Trans. Inf. Syst. 99-D(10): 2638-2642 (2016) - [j3]Peixin Chen, Yilun Wu, Jinshu Su, Xiaofeng Wang:
Comparing Performance of Hierarchical Identity-Based Signature Schemes. IEICE Trans. Inf. Syst. 99-D(12): 3181-3184 (2016) - [j2]Yilun Wu, Xicheng Lu, Jinshu Su, Peixin Chen:
An Efficient Searchable Encryption Against Keyword Guessing Attacks for Sharable Electronic Medical Records in Cloud-based System. J. Medical Syst. 40(12): 258:1-258:9 (2016) - [j1]Peixin Chen, Jinshu Su, Baokang Zhao, Xiaofeng Wang, Ilsun You:
An escrow-free online/offline HIBS scheme for privacy protection of people-centric sensing. Secur. Commun. Networks 9(14): 2302-2312 (2016)
Conference and Workshop Papers
- 2023
- [c16]Bing-Yuh Lu, Jixin Liu, Zhongyong Wang, Hongmei Li, Juhui He, Xing Wen, Peixin Chen, Jingquan Chen, Weijun Lai, Cancheng Huang:
Smart Mirror Activated by User's Face Recognition with Simulation of Artificial Intelligence Classifier. ICACT 2023: 23-27 - 2022
- [c15]Haolin Zou, Zhongyong Wang, Pao-An Lin, Weilong Zhan, Peixin Chen, Yuxin Li, Yuyang Chen, Zide She, Juhui He, Bing-Yuh Lu:
PID Control Aided Thermal Comfortable of the User's Temperature Tracing Movable Electrical Heating Radiator. ICACT 2022: 44-48 - [c14]Peixin Chen, Jian Zhao, Furao Shen:
Deep Reinforcement Learning Assisted UAV Trajectory and Resource Optimization for NOMA Networks. WCSP 2022: 933-938 - 2018
- [c13]Peixin Chen, Wu Guo, Lirong Dai, Zhenhua Ling:
Pseudo-Supervised Approach for Text Clustering Based on Consensus Analysis. ICASSP 2018: 6184-6188 - [c12]Peixin Chen, Wu Guo, Zhi Chen, Jian Sun, Lanhua You:
Gated Convolutional Neural Network for Sentence Matching. INTERSPEECH 2018: 2853-2857 - 2017
- [c11]Peixin Chen, Wu Guo, Qingnan Wang, Yan Song:
Topic classification based on distributed document representation and latent topic information. APSIPA 2017: 614-617 - [c10]Qingnan Wang, Wu Guo, Peixin Chen, Yan Song:
Tibetan-Mandarin bilingual speech recognition based on end-to-end framework. APSIPA 2017: 1214-1217 - 2016
- [c9]Qianqian Xing, Baosheng Wang, Xiaofeng Wang, Peixin Chen, Bo Yu, Yong Tang, Xianming Gao:
Unbounded Revocable Hierarchical Identity-Based Encryption with Adaptive-ID Security. HPCC/SmartCity/DSS 2016: 430-437 - [c8]Peixin Chen, Wu Quo, Guoping Hu:
Digit-dependent local i-vector for text-prompted speaker verification with random digit sequences. ISCSLP 2016: 1-5 - 2015
- [c7]Peixin Chen, Xiaofeng Wang, Baokang Zhao, Hao Sun, Jinshu Su, Ilsun You:
An Escrow-Free Hierarchical Identity-Based Signature Scheme from Composite Order Bilinear Groups. BWCCA 2015: 364-369 - [c6]Peixin Chen, Xiaofeng Wang, Yilun Wu, Jinshu Su, Huan Zhou:
POSTER: iPKI: Identity-based Private Key Infrastructure for Securing BGP Protocol. CCS 2015: 1632-1634 - [c5]Peixin Chen, Xiaofeng Wang, Jinshu Su:
A Hierarchical Identity-Based Signature from Composite Order Bilinear Groups. ICA3PP (Workshops and Symposiums) 2015: 46-56 - [c4]Peixin Chen, Xiaofeng Wang, Baokang Zhao, Jinshu Su, Ilsun You:
Removing Key Escrow from the LW-HIBE Scheme. ICA3PP (Workshops and Symposiums) 2015: 593-605 - [c3]Peixin Chen, Xiaofeng Wang, Jinshu Su:
An Escrow-Free Hierarchical Identity-Based Signature Model for Cloud Storage. ICA3PP (Workshops and Symposiums) 2015: 633-647 - [c2]Hao Sun, Xiaofeng Wang, Jinshu Su, Peixin Chen:
RScam: Cloud-Based Anti-Malware via Reversible Sketch. SecureComm 2015: 157-174 - [c1]Peixin Chen, Xiaofeng Wang, Jinshu Su:
T-HIBE: A Trustworthy HIBE Scheme for the OSN Privacy Protection. SocialSec 2015: 72-79
Informal and Other Publications
- 2024
- [i2]Zijian He, Peixin Chen, Guangrun Wang, Guanbin Li, Philip H. S. Torr, Liang Lin:
WildVidFit: Video Virtual Try-On in the Wild via Image-Based Controlled Diffusion Models. CoRR abs/2407.10625 (2024) - [i1]Weizhi Zhong, Junfan Lin, Peixin Chen, Liang Lin, Guanbin Li:
High-fidelity and Lip-synced Talking Face Synthesis via Landmark-based Diffusion Model. CoRR abs/2408.05416 (2024)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 21:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint